27
Mobile Malware Defense and possibly Anti-Forensics Sheran A. Gunasekera <[email protected] > IDSECCONF 2013, Surabaya, Indonesia 1

Mobile Malware defense and possibly Anti-forensics

Embed Size (px)

DESCRIPTION

Mobile Malware defense and possibly Anti-forensics - Sheran Gunasekera

Citation preview

Page 1: Mobile Malware defense and possibly Anti-forensics

Mobile Malware Defense

and possibly Anti-Forensics

Sheran A. Gunasekera <[email protected]>

IDSECCONF 2013, Surabaya, Indonesia1

Page 2: Mobile Malware defense and possibly Anti-forensics

Digital forensics - Analyzing & gathering evidence of incidents occurring on a digital device

Malware - Malicious software designed to disrupt or collect sensitive information from digital devices

2

Page 3: Mobile Malware defense and possibly Anti-forensics

In 2011, we saw unprecedented growth of mobile malware attacks with a 155 percent increase across all platforms. -- Daniel Hoffman (Juniper)

Malware

3

Page 4: Mobile Malware defense and possibly Anti-forensics

DetectionSignature based?

Unique characteristics

No signature, no detection

4

Page 5: Mobile Malware defense and possibly Anti-forensics

In 2012, 45 percent of the AV signatures failed to detect malware that used such basic transformation techniques -- Dark Reading Article [April 2013]

ACME Malware Detector

Malware Signatures

5

Page 6: Mobile Malware defense and possibly Anti-forensics

PWN3DAssume you’ve been infected

Helps you stay paranoid

6

Page 7: Mobile Malware defense and possibly Anti-forensics

ActorsYou

Your Mobile Device

The guy spying on you

7

Page 8: Mobile Malware defense and possibly Anti-forensics

Inbound & outbound email

Inbound & outbound SMS/MMS

Phone Call Logs

BBM Messages

Contact information

How does it work?

8

Page 9: Mobile Malware defense and possibly Anti-forensics

Crippling Malware

Relies on ex!ltrated data

Expects data to be accurate

But what if the data wasn’t accurate...?

9

Page 10: Mobile Malware defense and possibly Anti-forensics

Techniques

DDTS - Don’t Drop The Soap *

POEPFlood - Phony Object Escalation Process

FML - Flush My Log *

* Can be used for Anti-forensics

10

Page 11: Mobile Malware defense and possibly Anti-forensics

DDTS

Possible use for Anti-Forensics

Works on USB trigger

Use IOPortListener or USBPortListener

Trigger on event connectionRequested()

11

Page 12: Mobile Malware defense and possibly Anti-forensics

USB Connection •Flood Email•Flood SMS•Flood Contact•Flush Log

12

Page 13: Mobile Malware defense and possibly Anti-forensics

Hooking emailEmail Messages

Package: net.rim.blackberry.api.mail.event

Interface: FolderListener

Methods: messagesAdded()

- Intercept and forward all emails on the BlackBerry handheld

13

Page 14: Mobile Malware defense and possibly Anti-forensics

Listener

14

Page 15: Mobile Malware defense and possibly Anti-forensics

Listener

Flooder

15

Page 16: Mobile Malware defense and possibly Anti-forensics

16

Page 17: Mobile Malware defense and possibly Anti-forensics

Hooking Call Logs

17

Page 18: Mobile Malware defense and possibly Anti-forensics

Hooking Call Logs

18

Page 19: Mobile Malware defense and possibly Anti-forensics

Contact Flooder

Contact 1Contact 2Contact 3Contact 4

19

Page 20: Mobile Malware defense and possibly Anti-forensics

A note about keywordsFake email only as good as keywords

Build an algorithm to mine existing keywords

Think like the person that spies on you

If they search for “bank”,”password”,”pin”...

20

Page 21: Mobile Malware defense and possibly Anti-forensics

Log Files

Event LogLog Entry 1

Log Entry 2

Log Entry3

Log Entry n-2

Log Entry n-1

Log Entry n

...

16Kb Log Size

New entries written to the bottom

Old entries are ejected

21

Page 22: Mobile Malware defense and possibly Anti-forensics

FML

Event LogLog Entry 1

Crap

Crap

Crap

Crap

Crap

...

16Kb Log Size

FMLog attackwrites

fake data

Valid Entries are deleted

22

Page 23: Mobile Malware defense and possibly Anti-forensics

FML

BlackBerry Log Size - 16kb

Android LogCat size - 64kb

23

Page 24: Mobile Malware defense and possibly Anti-forensics

Why?

24

Page 25: Mobile Malware defense and possibly Anti-forensics

Why?

Unorthodox

Good wing-man for conventional

Frustrates the guy spying on you

25

Page 26: Mobile Malware defense and possibly Anti-forensics

Recap

• Assume you’re pwn3d

• Introduce controlled “noise” in your data

• Make it harder for the guy spying on us

• Sit back and laugh

26